|
|
Among the Graphic Software Programs, I Go For...
With the continuous stiff competition among software companies over the production of top-notch graphic software applications to make the world of graphic designing more exciting and compelling, web designers and graphic professionals are the...
Rogue Dialers - The Net's Latest Scamola!
If recent news stories concerning worms, trojans and security exploits within Microsoft's Internet Explorer, left you feeling vulnerable, this will leave you terrified. PC's the world over are already being hit by a new breed of trojan type...
Technical Writing for the Terrified
Introduction
Sometimes it may be beyond a companies or individuals budget to hire a professional writer to address their technical documentation. Although in an ideal world all technical documentation should be produced by a highly trained...
The Hidden Dangers of HTML Email
As a veteran Internet user, I can honestly say I remember a time when HTML email was not possible. Back then RTF wasn't available either and for that matter, email programs did not even wrap lines for you or allow file attachments. Today however,...
You have to try this, at least, once!
There is a unique freedom of expression that is available with websites/webpages, comparable to none. Text, images, hyperlinks, forms, specialized scripts, counters, clocks, pop-up's and unders, and thousands of other features, can be easily enough...
|
|
|
|
|
|
|
|
Black Hole Lists
When you send an email across the internet, you must first log into your ISP's email system. Generally, you set the login information (username and password) in some setup screen, then quickly forget about it. However, behind the scenes your username and password are used to log in each and every time you send email.
When the email system receives your message it opens a connection to the recipient email system and delivers the message. This is the way email normally works, at least on properly configured email systems.
Unfortunately, many emails systems are not properly configured (or have older, buggy software). These systems have become the bane of the internet and are one of the primary reasons that spam is so hard to fight.
These email servers are known as open relays. You see, email systems also have the ability to send messages to one another. This is known as relaying. In the good old days of the internet, back when it was a small network of universities and military installations, spam was not a significant issue. During those innocent times, there was little security because there were not many offenders. Thus, email systems did not protect themselves very well.
What is there to protect against? Spammers use open relay systems to hide their identity. What happens is simple. A spammer sends messages using one of these open relay systems and bypasses the normal security. The spammer is basically hijacking the email server to do his dirty work for him.
You see, email messages are actually enclosed in an electronic envelope which identifies where the message came from. So if a spammer sends a message through his own ISP's email server, then it could be tracked back to him because he has an account on that server.
However, if he hijacks an open relay, he can send all of the messages that he wants without worrying about being tracked. The email message identifies the open relay as the system where the email came from; however, the spammer is not a legitimate user. The open relay does not (unless it goes to great lengths) have a clue where the messages came from.
A spammer must rub his hands together in glee when he finds one of these systems. I can just imagine the evil laugh as the spammer presses the return key to send literally hundreds of thousands or even millions of messages through the open relay system.
This cannot happen on a properly configured, secured and patched email server.
Open relays are a big problem, and to combat that problem a number of services have appeared. These are called Blackhole Lists, and what they do is simply list all of the open relays that they know about. ISPs and others can subscribe to these lists and use them to block email messages.
Here's the process. A system is determined to be an open relay. It is added to one or more Blackhole lists. ISPs
that subscribe to the lists will bounce (return to sender) any messages that originate from the open relay email system. This means ALL users from that email system are blocked. Every single one of them.
I know that seems cruel, but look at it this way. The open relay is encouraging spammers and is an unwitting accomplice in their operations. In fact, many of these open relays do not even know they are causing a problem, and the first inkling that they get is when their users complain that things are running slowly or when problems occur with their servers.
The Blackhole lists are often run by individuals or small groups who believe in the anti-spam cause. They are often unpaid volunteers who simply want to help clean up the internet. They are also extraordinarily successful and many ISPs use their services.
To give you an idea of how successful this approach has been, there was a blackhole list called ORBZ. This was run by a young man named Ian Gulliver, a 20-year-old systems administrator from Ghent, New York. Ian is an extraordinary person and created one of the most successful blackhole lists ever.
What ORBZ did is send messages to email systems to determine if they were open relays. If it determined that the email system had this problem it added it to it's list. This was very successful until the end of March, 2002.
At that time, ORBZ probed the email server of Battle Creek, MI. Unfortunately, this system used the Lotus email system, which has a known bug. The probe caused the email server to slow down considerably, and it was interpreted by the city as a hacker attack.
The poor ORBZ administrator found himself the subject of a search warrant signed by a Michigan judge that authorized the search and seizure of all data relating to ORBZ accounts.
Ian almost immediately shut down the ORBZ system (he reopened the service a few days later with some major changes and a new name), which led directly to a huge amount of spam suddenly being received all over the internet. The closure of a single blackhole list had dramatic and noticeable results.
The upside is that blackhole lists prevent a tremendous amount of spam from getting sent throughout the internet. They are very efficient and the concept is simple and straightforward.
On the downside, blackhole lists are not governed by anyone and answer to no one. They add open relays (and other spam sources) to their lists using their own rules, and usually assume the suspected spammer is guilty until proven innocent.
They are, however, a necessary and vital piece in the war against spam.
About the Author
Richard Lowe Jr. is the webmaster of Internet Tips And Secrets at http://www.internet-tips.net - Visit our website any time to read over 1,000 complete FREE articles about how to improve your internet profits, enjoyment and knowledge.
|
|
|
|
|
Tucows Downloads - Download Freeware and Shareware Software |
Download freeware, shareware, and demos. Maintains over 45000 software titles that are tested, rated, reviewed and ready to download. |
www.tucows.com |
  |
Free Software Downloads and Software Reviews - Download.com |
Download shareware, freeware and Demo software for PC, Mac, Linux, and Handhelds categorized into categories, plus software reviews. |
www.download.com |
  |
Computer software - Wikipedia, the free encyclopedia |
This includes application software such as a word processor, which enables a ... Application software is often purchased separately from computer hardware. ... |
en.wikipedia.org |
  |
Shareware.com - Search for shareware programs and free software ... |
Search for shareware programs from more than a dozen downloadable software directories. |
www.shareware.com |
  |
Jumbo: Free & Shareware MP3 files, Games, Screen Savers & Computer ... |
Source of free and shareware computer programs and utilities for PC and Mac. Evaluate software and read product reviews. Download games and screen savers. |
www.jumbo.com |
  |
Computer Software in the Yahoo! Directory |
Browse categories featuring sites devoted to computer software, including shareware and freeware download sites, operating systems, desktop customization, ... |
dir.yahoo.com |
  |
IEEE Software |
IEEE Computer Society's magazine covering all aspects of software, including software engineering. |
www.computer.org |
  |
Free Downloads on ZDNet | Shareware, Trialware, Evaluation Software |
ZDNet's Software Directory is the Web's largest library of software downloads. Covering software for Windows, Mac, and Mobile systems, ZDNet's Software ... |
downloads.zdnet.com |
  |
FSF - The Free Software Foundation |
Free software is a matter of liberty not price. Think of "free" as in "free speech". |
www.fsf.org |
  |
Apple - Software |
Software products for your digital life. ... The perfect addition for professional review. QuickTime Broadcaster. Encoding software for live events. ... |
www.apple.com |
  |
Open Directory - Computers: Software |
In Partnership with AOL Search. about dmoz | report abuse/spam | help. the entire directory, only in Computers/Software. Top: Computers: Software (38471) ... |
dmoz.org |
  |
freshmeat.net: Welcome to freshmeat.net |
About: The Web browser is probably the most frequently used software today, ... Web professionals can use the software for functional testing and regression ... |
freshmeat.net |
  |
Software - GNU Project - Free Software Foundation (FSF) |
Listing of the GNU software packages. |
www.gnu.org |
  |
Sun Software |
Get enterprise-class software--Solaris 10 OS, the Java Enterprise System, ... Sun Java StorageTek Software reduces cost and complexity with a single, ... |
www.sun.com |
  |
Internet Real Estate.com -- owns and operates a portfolio of the ... |
SOFTWARE.COM · SWEEPSTAKES.COM · PHONE.COM PODCAST.COM ... Software.com | Sweepstakes.com | Phone.com | Podcast.com | Shop.com | Safety.com ... |
www.internetrealestate.com |
  |
Joel on Software |
A weblog by Joel Spolsky, a programmer working in New York City, about software and software companies. |
www.joelonsoftware.com |
  |
Amazon.com Software: Computer & video games, business, accounting ... |
Online shopping for computer & video games, business & office productivity software, software from Microsoft, Apple, Adobe & more; accounting, antivirus, ... |
www.amazon.com |
  |
IBM Software - Home Page |
IBM home page for all of its software products, including Lotus and Tivoli, with keyword search, category browse and AZ product names. |
www.ibm.com |
  |
Opera web browser: Homepage |
Copyright © 2006 Opera Software ASA. All rights reserved. Skip navigation. Opera Software ... Copyright Opera Software ASA . All rights reserved. ... |
www.opera.com |
  |
Google Directory - Computers > Software |
Search only in Software Search the Web ... Software Categorized by Letter: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ... |
www.google.com |
  |
|